Recap. Definition (Encryption: Caesar Cipher)
|
|
- Cordelia Heath
- 5 years ago
- Views:
Transcription
1 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26
2 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Definition (Encryption: Shift Cipher) + d = mod 26, d anumber
3 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Definition (Encryption: Shift Cipher) + d = mod 26, d anumber Definition (Decryption: Caeser Cipher) + 23 = mod 26
4 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Definition (Encryption: Shift Cipher) + d = mod 26, d anumber Definition (Decryption: Caeser Cipher) + 23 = mod 26 Definition (Decryption: Shift Cipher) + d mod 26 =, d is the additive inverse of d
5 Code Summary: Caesar Cipher We will talk about several di erent types of codes during the next few weeks and it will be good to keep a summary for each.
6 Code Summary: Caesar Cipher We will talk about several di erent types of codes during the next few weeks and it will be good to keep a summary for each. Encryption/Decryption Key
7 Code Summary: Caesar Cipher We will talk about several di erent types of codes during the next few weeks and it will be good to keep a summary for each. Encryption/Decryption Key Key Secrecy is the idea of how secret the decryption key must be. There are codes where anyone can have access to the key!
8 Code Summary: Caesar Cipher We will talk about several di erent types of codes during the next few weeks and it will be good to keep a summary for each. Encryption/Decryption Key Key Secrecy is the idea of how secret the decryption key must be. There are codes where anyone can have access to the key! Letter Frequency, or how much a cipher changes the nature of how often letters appear, will become increasingly important.
9 Code Summary: Caesar Cipher We will talk about several di erent types of codes during the next few weeks and it will be good to keep a summary for each. Encryption/Decryption Key Key Secrecy is the idea of how secret the decryption key must be. There are codes where anyone can have access to the key! Letter Frequency, or how much a cipher changes the nature of how often letters appear, will become increasingly important. Encrypt Decrypt Key Letter Cipher Key(s) Key(s) Secrecy Frequency Caesar 3 23 Private Normal Shift d d Private Normal
10 Related Idea: Frequency Analysis Anyone who has watched Wheel of Fortune or played Scrabble knows that the English language uses some letters more frequently than others. E A B C D F G H I J K L M N O P Q R S T U V W X Y Z Some codes do not hide the natural frequency of letters.
11 Related Idea: Frequency Analysis The Caesar Cipher disguises letters, but does not disguise the natural frequency of letters! H A B C D E F G I J K L M N O P Q R S T U V W X Y Z The most frequent symbol used in the ciphertext will correspond to the letter E in the plaintext. For the Caesar Cipher, this corresponds to the numeric and is the ciphertext letter H.
12 Recap Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n. Example 1. Simplify 14 mod Simplify 78 mod Simplify 29 mod 26.
13 Related Idea: Additive Inverse Definition (Related Idea: Additive Inverse) The additive inverse for a mod n is a value a so that a + a =0modn
14 Related Idea: Additive Inverse Definition (Related Idea: Additive Inverse) The additive inverse for a mod n is a value a so that a + a =0modn From working with codes, we can understand that using the additive inverse d really works by moving all letters to the left d places.
15 Related Idea: Additive Inverse Definition (Related Idea: Additive Inverse) The additive inverse for a mod n is a value a so that a + a =0modn From working with codes, we can understand that using the additive inverse d really works by moving all letters to the left d places. Example 1. Find the additive inverse of 8 mod 10.
16 Related Idea: Additive Inverse Definition (Related Idea: Additive Inverse) The additive inverse for a mod n is a value a so that a + a =0modn From working with codes, we can understand that using the additive inverse d really works by moving all letters to the left d places. Example 1. Find the additive inverse of 8 mod Find the additive inverse of 5 mod 12.
17 Related Idea: Additive Inverse Definition (Related Idea: Additive Inverse) The additive inverse for a mod n is a value a so that a + a =0modn From working with codes, we can understand that using the additive inverse d really works by moving all letters to the left d places. Example 1. Find the additive inverse of 8 mod Find the additive inverse of 5 mod Find the additive inverse of 7 mod 14.
18 Related Idea: Simplifying Negative Mods, Method 1 Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n.
19 Related Idea: Simplifying Negative Mods, Method 1 Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n. Simplifying the statement following: 1. First simplify a mod n, saya = b mod n. a mod n fora > 0 means do the
20 Related Idea: Simplifying Negative Mods, Method 1 Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n. Simplifying the statement following: 1. First simplify a mod n, saya = b mod n. a mod n fora > 0 means do the 2. Determine the additive inverse of b mod n.
21 Related Idea: Simplifying Negative Mods, Method 1 Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n. Simplifying the statement following: 1. First simplify a mod n, saya = b mod n. a mod n fora > 0 means do the 2. Determine the additive inverse of b mod n. Example (Additive Inverses and Negatives) Simplify 4 mod 10.
22 Related Idea: Simplifying Negative Mods, Method 1 Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n. Simplifying the statement following: 1. First simplify a mod n, saya = b mod n. a mod n fora > 0 means do the 2. Determine the additive inverse of b mod n. Example (Additive Inverses and Negatives) Simplify 4 mod 10. Simplify 20 mod 16.
23 Related Idea: Simplifying Negative Mods, Method 1 Recall that by simplifying the statement a mod n we mean to find anumberb between 0 and n 1 such that a = b mod n. Simplifying the statement following: 1. First simplify a mod n, saya = b mod n. a mod n fora > 0 means do the 2. Determine the additive inverse of b mod n. Example (Additive Inverses and Negatives) Simplify 4 mod 10. Simplify 20 mod 16. Simplify 14 mod 5.
24 SIDE A
25 Introduction to Vigenere Ciphers Example Enemy agents have started to make their codes more sophisticated. They now use multiple shifts at once! You intercept a message and learn that the shifts being used correspond to d 1 =4, d 2 = 15, d 3 =7. How would you encrypt the plaintext ATE? How would you encrypt the plaintext TEA?
26 Encryption Method: Vigenère Cipher Definition An English Language Vigenère Cipher uses a di erent shift for each letter, depending on the position of the letter in the message. Encryption uses the rule. 1 +d 1 mod 26 = 1 2 +d 2 mod 26 = 2 3 +d 3 mod 26 = 3 where 1 is the first plaintext letter and d 1 is the first shift, 2 is the second plaintext letter and d 2 is the second shift, etc...
27 Example Example Suppose you use a Vigenère Cipher with the following shifts. d 1 =4, d 2 = 15, d 3 =7.
28 Example Example Suppose you use a Vigenère Cipher with the following shifts. d 1 =4, d 2 = 15, d 3 =7. Encrypt the plaintext ATE.
29 Example Example Suppose you use a Vigenère Cipher with the following shifts. d 1 =4, d 2 = 15, d 3 =7. Encrypt the plaintext ATE. Encrypt the plaintext TEA.
30 Example Example Suppose you use a Vigenère Cipher with the following shifts. d 1 =4, d 2 = 15, d 3 =7. Encrypt the plaintext ATE. Encrypt the plaintext TEA. Encrypt these two words using the Caeser Cipher and compare the encrypted words to the ones you got above.
31 Related Idea: Keyword Definition We use a Keyword to represent all of the di erent shifts (and the order) to be used with a Vigenère Cipher.
32 Related Idea: Keyword Definition We use a Keyword to represent all of the di erent shifts (and the order) to be used with a Vigenère Cipher. Example The keyword ENEMY gives the following shifts: d 1 =5 d 2 = 14 d 3 =5 d 4 = 13 d 5 = 25 So the first letter in our message will get shifted 5 places to the right, the second letter will get shifted 14 places to the right, and so on.
33 One more example! Example Encode the word DUMPLING using the keyword ARENA.
34 One more example! Example Encode the word DUMPLING using the keyword ARENA. A=1 R=18 E=5 N=14 A=1
35 One more example! Example Encode the word DUMPLING using the keyword ARENA. A=1 R=18 E=5 N=14 A=1 DUMPLING 7! EMRDMJFL
36 One more example! Example Encode the word DUMPLING using the keyword ARENA. A=1 R=18 E=5 N=14 A=1 DUMPLING 7! EMRDMJFL What if we used the keyword GOB?
37 One more example! Example Encode the word DUMPLING using the keyword ARENA. A=1 R=18 E=5 N=14 A=1 DUMPLING 7! EMRDMJFL What if we used the keyword GOB? G=7 O=15 B=2
38 One more example! Example Encode the word DUMPLING using the keyword ARENA. A=1 R=18 E=5 N=14 A=1 DUMPLING 7! EMRDMJFL What if we used the keyword GOB? G=7 O=15 B=2 DUMPLING 7! KJOWAKUV
39 SIDE B (Part 1)
40 Decryption Method: Vigenère Cipher Definition A Vigenère Cipher can be decrypted as follows: (i) Identify d 1,d 2, d 3, etc... corresponding to the letters of the Keyword. (ii) Find the additive inverse d 1 to d 1.Nextfindthe additive inverse d 2 to d 2. Continue for all values d k. Together, the numbers d 1, d 2, d 3,... are called the Decryption Sequence. To decrypt a Vigenère Cipher, we use the rule k + d k mod 26 = k.
41 Example Example ( Example ) The enemy agent starts using a new keyword. You MUST break this new code! You figure out the shifts being used are d 1 =1, d 2 = 16, d 3 = 16 d 4 = 12, d 5 =5. What Keyword is being used for this Vigenère Cipher?
42 Example Example ( Example ) The enemy agent starts using a new keyword. You MUST break this new code! You figure out the shifts being used are d 1 =1, d 2 = 16, d 3 = 16 d 4 = 12, d 5 =5. What Keyword is being used for this Vigenère Cipher? What is the decryption sequence?
43 Example Example ( Example ) The enemy agent starts using a new keyword. You MUST break this new code! You figure out the shifts being used are d 1 =1, d 2 = 16, d 3 = 16 d 4 = 12, d 5 =5. What Keyword is being used for this Vigenère Cipher? What is the decryption sequence? Decrypt the ciphertext message FDUYD.
44 Related Idea: Advantages of the Vigenère Cipher The Vigenère Cipher is a HUGE improvement over Shift Ciphers because any single letter can be encrypted in many di erent ways.
45 Related Idea: Advantages of the Vigenère Cipher The Vigenère Cipher is a HUGE improvement over Shift Ciphers because any single letter can be encrypted in many di erent ways. Theorem (Counting Possibilities for the Vigenère Cipher) The number of di erent ways a letter can be encrypted using the Vigenère Cipher is at most the length of the keyword being used.
46 Related Idea: Advantages of the Vigenère Cipher The Vigenère Cipher is a HUGE improvement over Shift Ciphers because any single letter can be encrypted in many di erent ways. Theorem (Counting Possibilities for the Vigenère Cipher) The number of di erent ways a letter can be encrypted using the Vigenère Cipher is at most the length of the keyword being used. If the keyword has no repeats in letters then this number is exactly the length of the keyword.
47 Related Idea: Advantages of the Vigenère Cipher The Vigenère Cipher is a HUGE improvement over Shift Ciphers because any single letter can be encrypted in many di erent ways. Theorem (Counting Possibilities for the Vigenère Cipher) The number of di erent ways a letter can be encrypted using the Vigenère Cipher is at most the length of the keyword being used. If the keyword has no repeats in letters then this number is exactly the length of the keyword. Example For a Vigenère Cipher that uses the keyword TWIN, the letter E could be encrypted using T, W, I, or N. This means that E could be encrypted as Plaintext Numeric Keyword Numeric Ciphertext Y B N S
Chapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationBasic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline
CSC/ECE 574 Computer and Network Security Topic 2. Introduction to Cryptography 1 Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions
More informationClassic Cryptography: From Caesar to the Hot Line
Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationCHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 =
Math 167 Ch 17 Review 1 (c) Janice Epstein, 2013 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 = Math 167
More informationCryptography Worksheet
Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private
More informationCSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography
CSCI 454/554 Computer and Network Security Topic 2. Introduction to Cryptography Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions
More informationOutline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing
Outline CSCI 454/554 Computer and Network Security Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues Topic 2. Introduction to Cryptography 2 Cryptography Basic Concepts
More informationENGR/CS 101 CS Session Lecture 5
ENGR/CS 101 CS Session Lecture 5 No programming today Submission system will be demonstrated at the end of class. Lecture 5 ENGR/CS 101 Computer Science Session 1 Outline Problem: How to send a secret
More informationSubstitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.
Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationLecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes
What is Encryption Parties involved: Alice: The Sender Bob: The Receiver Eve: The Eavesdropper Aim of Encryption Alice wants to send a message to Bob The message should remain hidden from Eve What distinguishes
More informationModule 13 Network Security. Version 1 ECE, IIT Kharagpur
Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures
More informationOVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,
More informationFile and Disk Encryption
File and Disk Encryption Alex Applegate 1 Overview Common Weak Encryption Stronger Methods Threat From File Encryption Full Disk Encryption (FDE) Threat From FDE 2 Common Types of Weak File Encryption
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationCIS 3362 Final Exam 12/4/2013. Name:
CIS 3362 Final Exam 12/4/2013 Name: 1) (10 pts) Since the use of letter frequencies was known to aid in breaking substitution ciphers, code makers in the Renaissance added "twists" to the standard substitution
More informationL2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015
L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift
More informationModern Cryptography Activity 1: Caesar Ciphers
Activity 1: Caesar Ciphers Preliminaries: The Caesar cipher is one of the oldest codes in existence. It is an example of a substitution cipher, where each letter in the alphabet is replaced by another
More informationNature Sunday Academy Lesson Plan
Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns
More informationFor decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 10,
Math 167 Ch 17 WIR 1 (c) Janice Epstein and Tamara Carter, 2015 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9)
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationIntroduction to Cryptology. Lecture 2
Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationLecture 1: Perfect Security
CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationWorksheet - Reading Guide for Keys and Passwords
Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationCryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY
Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY Math Circle January 14, 2018 1. For as long as humans have existed, humans have tried to hide information from other humans.
More informationCSC 580 Cryptography and Computer Security
CSC 580 Cryptography and Computer Security Encryption Concepts, Classical Crypto, and Binary Operations January 30, 2018 Overview Today: Cryptography concepts and classical crypto Textbook sections 3.1,
More informationRSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.
RSA (material drawn from Avi Kak (kak@purdue.edu) Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto. protocols The RSA algorithm is based on the following property
More informationClassical Cryptography. Thierry Sans
Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY
More informationPolyalphabetic cyphers
Unit 7 January 26, 2011 1 Polyalphabetic cyphers Let E 1, E 2,..., E n be distinct substitution cyphers. To encrypt a plaintext message P = p 1 p 2 p 3... apply the E i (i = 1,..., n) cyclically to the
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationGreat Theoretical Ideas in Computer Science. Lecture 27: Cryptography
15-251 Great Theoretical Ideas in Computer Science Lecture 27: Cryptography What is cryptography about? Adversary Eavesdropper I will cut his throat I will cut his throat What is cryptography about? loru23n8uladjkfb!#@
More informationCryptography Introduction to Computer Security. Chapter 8
Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure
More informationSecurity issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.
Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed
More informationCryptography Part II Introduction to Computer Security. Chapter 8
Cryptography Part II Introduction to Computer Security Chapter 8 Vigènere Cipher Like Cæsar cipher, but use phrase Example Message: THE BOY HAS THE BALL Key: VIG Encipher using Cæsar cipher for each letter:
More informationLECTURE 4: Cryptography
CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson
More informationCryptography Lesson Plan
Cryptography Lesson Plan Overview - Cryptography Summary There is a large amount of sensitive information being stored on computers and transmitted between computers today, including account passwords,
More informationCryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals
Cryptography December 9, 2008 1 Intercepting Information Scenario 1 Wireless broadcasts information using radio signals Any computer on a wireless network CAN listen to any network traffic http://www.geeksquad.com/
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : CSS 322 Security and Cryptography Instructor
More informationCryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building
Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography
More informationMulti-Level Encryption using SDES Key Generation Technique with Genetic Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with
More informationSecurity: Cryptography
Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity
More informationIntroduction Classical Confidentiality Modern Confidentiality Integrity Authentication
Cryptography Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Introduction Cryptography in the Real World Cryptography is the process of writing or reading secret
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationSecurity in Distributed Systems. Network Security
Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter 8 Ross/Kurose, Ch 7 (available online) Computer Science Lecture 22, page 1 Network Security
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationChapter 16 Identification Numbers Understand the purpose of a check digit. Know what a bmod
(c) Epstein 2013 1 Exam 3 Review Exam 3 Learning Objectives Chapter 16 Identification Numbers Understand the purpose of a check digit. Know what a bmod m means and be able to calculate xmod y. Know the
More informationSenior Math Circles Cryptography and Number Theory Week 1
Senior Math Circles Cryptography and Number Theory Week 1 Dale Brydon Feb. 2, 2014 1 One-Time Pads Cryptography deals with the problem of encoding a message in such a way that only the intended recipient
More informationECE 646 Fall 2008 Multiple-choice test
ECE 646 Fall 2008 Multiple-choice test 1. (1 pt) Arrange the following ciphers in the order of the increasing measure of roughness for the ciphertext obtained by encrypting 1000-letter message with a given
More informationJNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World
Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not
More informationCryptosystems. Truong Tuan Anh CSE-HCMUT
Cryptosystems Truong Tuan Anh CSE-HCMUT anhtt@hcmut.edu.vn 2 In This Lecture Cryptography Cryptosystem: Definition Simple Cryptosystem Shift cipher Substitution cipher Affine cipher Cryptanalysis Cryptography
More informationClassical Encryption Techniques
Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,
More informationCryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1
Cryptography Encryption COMP620 Information Privacy & Security Cryptography in general represents the process of encrypting a plain text file into an unreadable cipher so that it can be stored and decrypted
More informationUzzah and the Ark of the Covenant
Uzzah and the Ark of the Covenant And when they came to the threshing floor of Chidon, Uzzah put out his hand to take hold of the ark, for the oxen stumbled. 10 And the anger of the LORD was kindled against
More information2.3 SUBTITUTION CIPHERS.
Lec 5 : Data Security Substitution Cipher Systems 1 2.3 SUBTITUTION CIPHERS. 2.3.1 SIMPLE SUBTTTUION CIPHERS: In simple substitution (or monoalphabetic) ciphers, each character of the plaintext is replaced
More informationBehrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18
Behrang Noohi School of Mathematical Sciences Queen Mary University of London 22 July 2014 Behrang Noohi (QMUL) 1 / 18 Introduction Secure Communication How can one send a secret message? Steganography
More informationPublic Key Cryptography and the RSA Cryptosystem
Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique
More informationAlgebraic Solutions of Caesar and Multiplicative Ciphers
Spring 2015 Chris Christensen MAT/CSC 483 Algebraic Solutions of Caesar and Multiplicative Ciphers The Caesar cipher and the multiplicative cipher each involve one algebraic operation addition modulo 26
More informationIntroduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library
Administrative Details Introduction to Cryptography Lecture 1 Benny Pinkas Grade Exam 75% Homework 25% (might include programming) Office hours: Wednesday, 12-13. Email: benny@cs.haifa.ac.il Web page:
More informationIntroduction to Cryptography. Lecture 1
Introduction to Cryptography Lecture 1 Benny Pinkas page 1 1 Administrative Details Grade Exam 75% Homework 25% (might include programming) Office hours: Wednesday, 12-13. Email: benny@cs.haifa.ac.il Web
More informationIntroduction to Cryptography
Introduction to Cryptography Jiyou Li lijiyou at sjtu.edu.cn Department of Mathematics, Shanghai Jiao Tong University Sep. 17th, 2013 Cryptography Cryptography: the art and science of keeping message secure.
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 13, 2012 CPSC 467b, Lecture 3 1/36 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine
More informationCryptanalysis. Ed Crowley
Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,
More information2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography
CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis
More informationCryptography ThreeB. Ed Crowley. Fall 08
Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,
More informationCryptography. Andreas Hülsing. 6 September 2016
Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:
More informationSending secret messages with cryptography. An activity by the Australian Computing Academy
Sending secret messages with cryptography An activity by the Australian Computing Academy The activity uses ciphers to encode and decode secret messages. Activity overview What s it all about? By following
More informationStream Ciphers. Çetin Kaya Koç Winter / 13
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 13 Block Ciphers Cryptography Plaintext: M i with M i = n, where n is the block length (in bits) Ciphertext: C i with C i = m, where m n, however,
More informationPrivate-Key Encryption
Private-Key Encryption Ali El Kaafarani Mathematical Institute Oxford University 1 of 32 Outline 1 Historical Ciphers 2 Probability Review 3 Security Definitions: Perfect Secrecy 4 One Time Pad (OTP) 2
More informationCryptography Intro and RSA
Cryptography Intro and RSA Well, a gentle intro to cryptography, followed by a description of public key crypto and RSA. 1 Definition Cryptology is the study of secret writing Concerned with developing
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationCRYPTOGRAPHY. BY, Ayesha Farhin
CRYPTOGRAPHY BY, Ayesha Farhin Overview Introduction Types Advantages n Disadvantages Future Developments Bibliography Introduction Cryptography considered as a branch of both mathematics and computer
More informationChapter 2: Classical Encryption Techniques
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic
More informationThe Caesar Cipher Informatics 1 Functional Programming: Tutorial 3
The Caesar Cipher Informatics 1 Functional Programming: Tutorial 3 Heijltjes, Wadler Due: The tutorial of week 5 (23/24 Oct.) Reading assignment: Chapters 8 and 9 (pp. 135-166) Please attempt the entire
More informationCS 161 Computer Security
Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values
More informationCS 135: Fall Project 2 Simple Cryptography
CS 135: Fall 2010. Project 2 Simple Cryptography Project Rules: You should work on the project in your assigned team. This project is worth 60 points towards your total projects grade. If you choose to
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationSome Stuff About Crypto
Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More informationClassical Encryption Techniques
Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationDue: March 8, 11:59pm. Project 1
COS 433: Cryptography (Spring 2018) Project 1 Princeton University Due: March 8, 11:59pm Project 1 Introduction You are interning at the super secretive SLA (Three Letter Agency). The SLA has intercepted
More informationCryptography. What is Cryptography?
Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationCS 332 Computer Networks Security
CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your
More informationCSCE 548 Building Secure Software Symmetric Cryptography
CSCE 548 Building Secure Software Symmetric Cryptography Professor Lisa Luo Spring 2018 Previous Class Important terms Vulnerability Attack Attack vector Exploit 2 Previous Class Attack surface Components
More informationStream Ciphers. Koç ( ucsb ccs 130h explore crypto fall / 13
Stream Ciphers Çetin Kaya Koç http://cs.ucsb.edu/~koc koc@cs.ucsb.edu Koç (http://cs.ucsb.edu/~koc) ucsb ccs 130h explore crypto fall 2014 1 / 13 Block Ciphers Plaintext: M i with M i = n, where n is the
More informationPublic Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA
Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret
More informationEE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions
EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions Assigned: Tuesday, January 17, 2017, Due: Sunday, January 28, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering
More informationIntroduction to Cryptography. Lecture 3
Introduction to Cryptography Lecture 3 Benny Pinkas March 6, 2011 Introduction to Cryptography, Benny Pinkas page 1 Pseudo-random generator seed s (random, s =n) Pseudo-random generator G Deterministic
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More information7. Symmetric encryption. symmetric cryptography 1
CIS 5371 Cryptography 7. Symmetric encryption symmetric cryptography 1 Cryptographic systems Cryptosystem: t (MCKK GED) (M,C,K,K,G,E,D) M, plaintext message space C, ciphertext message space K, K, encryption
More informationNUMB3RS Activity: Creating Codes. Episode: Backscatter
Teacher Page 1 NUMB3RS Activity: Creating Codes Topic: Codes Grade Level: 10-12 Objective: Explore several coding methods Time: 30+ minutes Materials: TI-83/84 Plus calculator Introduction While lecturing
More informationP2_L6 Symmetric Encryption Page 1
P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,
More informationChapter 9. Public Key Cryptography, RSA And Key Management
Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on
More information